Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

A survey of privacy vulnerabilities of mobile device sensors

P Delgado-Santos, G Stragapede, R Tolosana… - ACM Computing …, 2022 - dl.acm.org
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …

[图书][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …

Preserving privacy by de-identifying face images

EM Newton, L Sweeney, B Malin - IEEE transactions on …, 2005 - ieeexplore.ieee.org
In the context of sharing video surveillance data, a significant threat to privacy is face
recognition software, which can automatically identify known people, such as from a …

State-of-the-art in privacy preserving data mining

VS Verykios, E Bertino, IN Fovino, LP Provenza… - ACM Sigmod …, 2004 - dl.acm.org
We provide here an overview of the new and rapidly emerging research area of privacy
preserving data mining. We also propose a classification hierarchy that sets the basis for …

Random projection-based multiplicative data perturbation for privacy preserving distributed data mining

K Liu, H Kargupta, J Ryan - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This paper explores the possibility of using multiplicative random projection matrices for
privacy preserving distributed data mining. It specifically considers the problem of computing …

Association rule hiding

VS Verykios, AK Elmagarmid, E Bertino… - … on knowledge and …, 2004 - ieeexplore.ieee.org
Large repositories of data contain sensitive information that must be protected against
unauthorized access. The protection of the confidentiality of this information has been a long …

Maintaining data privacy in association rule mining

SJ Rizvi, JR Haritsa - VLDB'02: Proceedings of the 28th International …, 2002 - Elsevier
Publisher Summary Data mining services require accurate input data for their results to be
meaningful, but privacy concerns may influence users to provide spurious information. The …

[PDF][PDF] Privacy preserving frequent itemset mining

SRM Oliveira, OR Zaiane - … of the IEEE ICDM workshop on …, 2002 - webdocs.cs.ualberta.ca
One crucial aspect of privacy preserving frequent itemset mining is the fact that the mining
process deals with a trade-off: privacy and accuracy, which are typically contradictory, and …

Hiding association rules by using confidence and support

E Dasseni, VS Verykios, AK Elmagarmid… - Information Hiding: 4th …, 2001 - Springer
Large repositories of data contain sensitive information which must be protected against
unauthorized access. Recent advances, in data mining and machine learning algorithms …